Search Results - (( iot applications new algorithm ) OR ( _ application using algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    TDMA scheduling analysis of energy consumption for iot wireless sensor network by Islam, Md Ashikul

    Published 2019
    “…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway by Nurul Saliha A. Ibrahim, Nurul Saliha A. Ibrahim, Faiz A. Saparudin, Faiz A. Saparudin

    Published 2023
    “…As a result, the Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review by Al-Qadhi, Abdulrahman K., Latip, Rohaya, Chiong, Raymond, Athauda, Rukshan, Hussin, Masnida

    Published 2025
    “…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T... by Mohamad Nazim, Jambli, Mohamad Zul Haziq, Mohd Fadzli, Sinarwati, Mohamad Suhaili, Nur Haryani, Zakaria

    Published 2024
    “…Practical insights are offered alongside cutting-edge applications, such as blockchain, the Internet of Things (IoT), QR code, and augmented reality (AR), as well as the consideration of privacy, trust, and authentication through digital signatures. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9
  10. 10

    Task offloading paradigm in mobile edge computing-current issues, adopted approaches, and future directions by Akhlaqi, Mohammad Yahya, Mohd Hanapi, Zurina

    Published 2023
    “…In addition, new technologies such as the Internet of Things (IoT), Autonomous Vehicles (AV), 5G, and Augmented Reality (AR) bring new demands and opportunities that MEC can make possible. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate by Abdulraheem, Waleed Khalid Amin

    Published 2019
    “…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. …”
    Get full text
    Get full text
    Thesis
  13. 13

    The Evolutionary Convergent Algorithm: A Guiding Path of Neural Network Advancement by Hosseini E., Al-Ghaili A.M., Kadir D.H., Daneshfar F., Gunasekaran S.S., Deveci M.

    Published 2025
    “…In the past few decades, there have been multiple algorithms proposed for the purpose of solving optimization problems including Machine Learning (ML) applications. …”
    Article
  14. 14
  15. 15
  16. 16

    Reliable low power network protocol in IoT for agriculture field by Wong, Christopher Jin Soon

    Published 2024
    “…Deployment of IoT networks in agriculture use cases face multiple constraints, including power constraints. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN by Ibrahim, Nurul Saliha Amani

    Published 2022
    “…Unmanned aerial vehicles (UAV) have enormous potential in enabling new applications in various areas, ranging from communication, military, security, to traffic-monitoring applications. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…These cluster chains are connected by another blockchain. A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
    Get full text
    Get full text
    Article
  19. 19

    'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al... by Eka Wahyu, Aditya, Nur Haryani, Zakaria, Fazli, Azzali, Mohamad Nazim, Jambli

    Published 2024
    “…Practical insights are offered alongside cutting-edge applications, such as blockchain, the Internet of Things (IoT), QR code, and augmented reality (AR), as well as the consideration of privacy, trust, and authentication through digital signatures. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  20. 20

    Intersection Features For Android Botnet Classification by Ismail, Najiahtul Syafiqah, Yusof, Robiah, Saad, Halizah, Abdollah, Mohd Faizal, Yusof, Robiah

    Published 2019
    “…Many of IoT devices will be supposedly controlled through a mobile, giving application (apps) developers great opportunities in the development of new applications. …”
    Get full text
    Get full text
    Get full text
    Article